Meltdown & Spectre Vulnerabilities

Print Friendly and PDF

Summary

Performance testing of Redhat and CentOS systems running Brainspace, both before and after applying vendor recommended security patches to mitigate against Spectre (CVE-2017-5753 and CVE-2017-5715) and Meltdown (CVE-2017-5754) security vulnerabilities , indicate that there is NOT a significant performance degradation as a result of installing the patches.

Brainspace recommends that each of our customers take action to apply these security patches to their systems in a timely and efficient manner, in accordance with their security policy.

Background

There has been much speculation since major processor vendors, including Intel and AMD, announced vulnerabilities associated with their microprocessors. Security fixes were quickly released by major OS providers to patch and mitigate against the vulnerabilities, however there is potential risk that the fix, which restricts the processor's speculative execution capabilities, could negatively affect server performance. 

Brainspace testing of the patches affect for major processing functions in Brainspace, including system load to memory following restart, brain creation from prior data collection, new brain creation from external data source and iterative machine learning functions using our Predictive Coding and CMML classifiers, showed no measurable impact to system performance.

For additional information on this topic, please reference the following links.

Redhat: https://www.redhat.com/en/blog/what-are-meltdown-and-spectre-heres-what-you-need-know

CentOS: https://lists.centos.org/pipermail/centos-announce/2018-January/022696.html

Links to vendor provided patches can be found here: https://docs.ovh.com/fr/dedicated/meltdown-spectre-kernel-update-per-operating-system/

 

Have more questions? Submit a request

0 Comments

Article is closed for comments.
Powered by Zendesk